1
0

codeql.yml 1.4 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344
  1. name: "CodeQL"
  2. on:
  3. push:
  4. branches: [main]
  5. pull_request:
  6. branches: [main]
  7. # schedule:
  8. # - cron: '23 12 * * 4'
  9. jobs:
  10. analyze:
  11. name: Analyze Code
  12. runs-on: ubuntu-latest
  13. permissions:
  14. actions: read
  15. contents: read
  16. security-events: write
  17. strategy:
  18. matrix:
  19. language: ["javascript"]
  20. # CodeQL supports [ 'cpp', 'csharp', 'go', 'java', 'javascript', 'python' ]
  21. # Learn more:
  22. # https://docs.github.com/en/free-pro-team@latest/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#changing-the-languages-that-are-analyzed
  23. steps:
  24. - name: Checkout repository and submodules
  25. uses: actions/checkout@v4
  26. with:
  27. submodules: recursive
  28. # Initializes the CodeQL tools for scanning.
  29. - name: Initialize CodeQL
  30. uses: github/codeql-action/init@v3
  31. with:
  32. languages: ${{ matrix.language }}
  33. # If you wish to specify custom queries, you can do so here or in a config file.
  34. # By default, queries listed here will override any specified in a config file.
  35. # Prefix the list here with "+" to use these queries and those in the config file.
  36. # queries: ./path/to/local/query, your-org/your-repo/queries@main
  37. - name: Perform CodeQL Analysis
  38. uses: github/codeql-action/analyze@v3